CONTAINER WITH INTERIOR ENCLOSURE OF COMPOSITE MATERIAL HAVING EMBEDDED SECURITY ELEMENT
An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel.
Latest Patents:
This applications claims benefit of U.S. Provision Patent Applications Ser. No. 61/022,727 filed Jan. 22, 2008, and Ser. No. 61/055,109 filled May 21, 2008, the entire contents of each of which is incorporated by reference in its entirety.
The subject matter of this application is also related to and can be used in conjunction with the devices and techniques described in U.S. Provisional Applications Ser. Nos. 60/782,438 filed Mar. 15, 2007, 60/851,264 filed Oct. 12, 2006, 60/899,212 filed Feb. 1, 2007, 60/899,275 filed Feb. 1, 2007, 60/899,216 filed Feb. 1, 2007, and 60/899,088 filed Feb. 1, 2007, the entire contents of each of which is incorporated by reference in its entirety.
The subject matter of this application is also related to and can be used in conjunction with the devices and techniques described in International Application Ser. Nos. PCT/US2008/001394 and PCT/US2008/001350 both filed Feb. 1, 2008, the entire contents of each of which is incorporated by reference in its entirety.
The subject matter of this application is also related to and can be used in conjunction with the devices and techniques described in U.S. patent application Ser. No. 12/277,100 filed Nov. 24, 2008 and U.S. Pat. No. 7,475,428 issued Jan. 6, 2009, the entire contents of each of which is incorporated by reference in its entirety.
FIELD OF THE INVENTIONThe present invention relates generally to the field of containers and more particularly to secure containers configured to withstand attempts at intrusion.
BACKGROUND OF THE INVENTIONThere has been a recognition that the United States is at risk of the delivery of weapons of mass destruction to its ports by enemies employing a strategy of hiding such a weapon in a shipping container. Various schemes have been proposed for x-raying containers or otherwise examining containers as they are loaded on ships in foreign ports. Such schemes, however, can be very limited in effectiveness since they can be defeated with x-ray shielding, vulnerable to compromise by rogue employees and the contents of the containers altered after they are loaded in a foreign port.
Approximately sixteen million twenty foot containers are in use throughout the world. Additionally, approximately 40% of the personnel that load and off-load these containers come from nations that are on the terrorist list. Bribery and sabotage are common throughout the shipping industry, including government officials, shipping companies and freight forwarders. Large quantities of contraband material now pass through the maritime commerce into most ports in the U.S.
The current shipping containers are primarily made of steel with considerable drawbacks. The steel containers increase shipping weights unnecessarily, wear out quickly, and can be infiltrated by simple means. Other panels not made of steel have been considered, but they are typically not made of weldable material (i.e. material which is suitable for undergoing welding without experiencing a substantial amount of damage). Weldable material such as steel is provided to form a right angel joint between a vertical corrugated frame and a horizontal beam, such as a side panel joining to the upper and lower container frames. By way of contrast, a composite panel can form a very strong glue bond with a metal flange that is in the same plane where the gluing can be accomplished with pressure.
To a limited degree, the notion of enclosing detecting devices, such as sensors or processors, in containers, which communicate with external systems, has been implemented in unsecure applications. For example, Sensitech, based in Beverly, Mass. (www.sensitech.com), provides solutions in the food and pharmaceuticals fields that are used for monitoring temperature and humidity for goods, in-transit, in-storage, and display. Such, temperature and humidity monitors are typically placed in storage and transit containers to monitor if desired conditions are maintained.
However, such data collection is not generally considered sensitive with respect to security issues. Rather, it is used for ensuring that products in a container do not spoil by being subjected to unfavorable temperature and humidity conditions. Secure communications, tamper resistance, and detection are not particularly relevant issues in such settings. Additionally, such monitors do not monitor for the presence of suspicious content or materials, no matter where they may be introduced in the chain.
Even if detectors are introduced into a container and interfaced to an external system, an “enemy” may employ any of a variety of strategies to defeat such a detection system. For instance, an enemy may attempt to shield the suspicious materials or activities from the detectors; defeat the communication interface between the detectors and the external system, so that the interface does not report evidence of suspicious materials or activities sensed by the detectors; disconnect the detectors from the interface; surreptitiously load a container that contains an atomic weapon, but that does not contain detecting devices, onto a container ship; overcome external systems so that they incorrectly report on the status of the detectors.
SUMMARY OF THE INVENTIONThe present invention relates to a method of manufacturing, distributing, and utilizing shipping containers such that they may be monitored for unauthorized access. The present invention also relates to methods of making and utilizing inherently secure shipping containers that improve shipping processes and provide a savings in the cost of transportation, increased control, faster throughput, and reduction of losses due to pilferage.
The present invention relates to a security structure, such as a wall or container including composite panels configured with embedded security elements attachable to a welded metal frame. The composite panels, when attached to the frame, form a contiguous surface, such as an enclosure, of the composite material. Beneficially, the contiguous composite surface with the embedded security elements is configured to detect a breach of the security structure. The structure can be assembled using multiple panels of a multilayered composite material that can be attached to other components, for example to a frame or to one or more panels to form a tamper-resistant container, such as a shipping container, without a substantial gap between adjoining composite panels. In addition, each of the panels may contain embedded processors and sensors that can detect any substantial intrusion or tampering with the container.
Some embodiments of the invention relate to a security structure including a weldable frame. The security structure also includes multiple composite panels, each panel securable to the weldable frame, for example, made of metal, such as steel. Each composite panel is configured to form one or more joints with adjacent composite panels when attached to the weldable frame. Each of the composite panels respectively includes an embedded security element, wherein the security element is configured to detect a breach in the composite panel. The weldable frame can include a parallelepiped, with the composite panels attached thereto forming an interior enclosure of contiguous composite material panels. In an alternate form, flanges may extend from the frame members so that the flanges provide support surfaces for the composite panels.
Other embodiments of the invention relate to a method for assembling a security container. The method includes welding together elongated members to form a metal frame defining an “interior” volume. A plurality of composite panels are aligned to substantially enclose the volume defined by the welded metal frame. The plurality of aligned composite panels are subsequently attached to the welded metal frame forming an enclosure of composite material.
As an intermediate, a set of flanges may be welded to the frame members, to provide a peripheral support surface for the composite panels. For embodiments including flanges extending from the frame members, the flanges are welded to the frame members. After the flanges have been welded in place, the composite panels are glued or otherwise secured to the flanges.
In one aspect an apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel.
In some embodiments, a first and a second of the security element embedded, respectively, within a first and a second of the plurality of composite panels are interconnected such that the first security element can detect a breach in the second composite panel.
In some embodiments, the one or more security structures include a first and a second security structure. Each of the security structures include: weldable frame; at least one composite panel, the panel securable to the weldable frame, and a respective security element embedded within the composite panel configured to detect a breach in the composite panel. The apparatus includes a corner joint, where, at the corner joint, at least a portion of the weldable frame of each of the first and the second security structures are welded to each other or to a weldable support member, and at least a portion of a composite panel from the first security structure and at least a portion of a composite panel from the second security structure form an angled joint or substantially contiguous composite material. In some embodiments, the corner joint includes an interconnect between security elements embedded in the first and the second security structures.
In some embodiments, the plurality of security structures form an enclosure surrounding a volume with substantially contiguous composite material. The enclosure may be substantially free of gaps in the contiguous composite material, and includes a plurality of interconnected security elements configured to detect any substantial breach of the enclosure. Some embodiments include a monitor in communication with the plurality of interconnected security elements and configured to monitor for any substantial breach of the enclosure. In some embodiments, the monitor unit is located within the enclosure, and further including a transmitter configured to transmit a signal indicative of a detection of a substantial breach of the enclosure to a receiver located outside of the enclosure.
Some embodiments include a weldable container frame and where at least one weldable frame of the one or more security structures is welded to the container frame. Some embodiments include a metal shipping container, the shipping container surrounding the enclosure and including at least a portion of the weldable container frame. In some embodiments, the enclosure substantially conforms to the interior shape of the metal shipping container.
In some embodiments, the at least one joint includes at least one chosen from the list consisting of: a butt joint, a lap joint, a mitered joint, a dado.
In some embodiments, the security element includes a conductive element or a waveguide.
In some embodiments, where each composite panel of the plurality of composite panels is fastened to the frame using at least one chosen from the group consisting of: a chemical fastener, glue, epoxy, cement.
Some embodiments include a composite member including a security element, the elongated composite member configured to cover a gap between adjacent composite panels forming the enclosure.
In another aspect, a method is disclosed including assembling one or more security structures by, for each security structure, forming a weldable frame; aligning each panel of a plurality of composite panels to form a substantially contiguous composite surface with the other panels, each of the composite panels including an embedded security element configured to detect a breach of the composite panel; and attaching each panel of the plurality of aligned composite panels to the weldable frame thereby forming a contiguous composite surface attached to the welded metal frame.
Some embodiments include interconnecting a plurality of the embedded security elements.
In some embodiments, one or more security structures include a plurality of security structures. The method may further include: arranging the security structures to form an enclosure surrounding a volume with substantially contiguous composite material. In some embodiments, the enclosure is substantially free of gaps in the contiguous composite material, and includes a plurality of interconnected security elements configured to detect any substantial breach of the enclosure.
Some embodiments include monitoring for a detected breach of the enclosure.
Some embodiments include, prior to attaching each panel of the plurality of aligned composite panels to the weldable frame of each security structure, welding the weldable frame of one or more of the security elements to the weldable frame of another of the one or more of the security elements or a weldable container frame.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
Exemplary dimensions are shown in various figures. However, other suitable dimensions may be used.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTSThis disclosure relates to using composite materials to embed sensors (e.g. intrusion detection sensors), whereby the composite materials form composite panels, which are then joined together to form a substantially continuous composite surface that will enclose a volume, as in a container. Composite panels thus formed can be used to produce maritime shipping containers, air cargo containers, truck bodies or other types of containers in circumstances where the government or industry wishes to detect breach of or an intrusion into the protected volume.
This type of technology is useful to protect the United States from an adversary attempting to use shipping containers of various sorts to introduce weapons of mass destruction, such as nuclear weapons, chemical or biological weapons, or dirty bombs into the United States.
As disclosed in U.S. Provisional Patent Application No. 60/872,956 (converted Oct. 3, 2007 to U.S. patent application Ser. No. 11/866,655), entitled “Composite Weldable Panel with Embedded Devices,” filed on Dec. 4, 2006, a composite panel may be first formed, and then pressed and glued onto a frame which surrounds the panel. The panel with its composite-glued-in frame is then welded to a container frame, such as a frame for a maritime container. The technology described in the referenced application includes a metal band surrounding the composite material. This could be a metal band around the entire perimeter of a panel, or complete side of an assembled container. Even if intrusion detection devices were embedded in such composite panels, it may be possible for an adversary to break through the metal band without encountering any of the intrusion detection devices.
The technique described herein involve forming the composite material/metal container with a substantially continuous outer composite surface that completely envelopes the enclosed volume. Rather than gluing the composite material first to a surrounding metal frame and then welding the surrounding metal frame to a container frame, a panel frame is first welded to a container frame. The composite panels are subsequently pressed and glued, or otherwise adhered (e.g. using a chemical fastener, glue, epoxy, cement, etc.), to the surrounding frame after the surrounding frame has already been welded to the container frame. Since the welding has already taken place prior to application of composite panels, the composite panels can be pressed and glued into their frames, in the immediate vicinity of the weld joints, such that they adjoin or overlap one another, without danger of heat damage.
With a contiguous surface of composite material constructed in this fashion, and with the composite panels corrugated as they may be with current steel containers, additional procedures can be implemented to provide appropriate joints where the corrugations come together.
Where the corrugated end panels adjoin the roof panels in which the corrugations are running across the width of the panel, the corrugated panels coming up from the end need to be joined to a flat surface presented by sides of the roof panels. For steel corrugated panels, the joint can be achieved by welding the corrugated sides to the bottom of the corrugated roof panels. However, a joint of this nature is not possible for composite panels.
Referring to
In some embodiments, the security elements are driven by an energizing source 404. For example, an energizing source 404 can be a laser or light emitting diode for a fiber optic security element 402. Alternatively, an energizing source 404 can be an electrical power source for an electrically conducting security element. In addition to the energizing source 404, the security elements are coupled to one or more energy detectors 406 receiving energy from the security elements 402. For example, the detectors 406 can include photodetectors, phototransistors, avalanche photodiodes, charge coupled devices, or any other suitable detector, for detecting energy received from a fiber optic security element. Detectors 406 can also include a meter, current source, an indicator, or any other suitable electrical device for detecting energy received from the security element. In operation, when one or more of the security elements are severed, the amount of received energy at the one or more detectors is varied.
An exemplary container wall is illustrated in
Interconnects 408 can be formed using jumper straps attached using one or more of mechanical fasteners, conductive chemical fasteners, and soldering. In some embodiments, the embedded security elements align with each other in an overlapping joint with an adjoining panel. A conductive fastener, such as a rivet, a screw, a nail, or a staple can be used to pierce the overlapping edges of the composite panels at the location of the aligned security elements. With such an arrangement, the conductive fastener forms a via providing a conductive path between the security elements of multiple panels 401.
For optical security elements, interconnects 408 can be formed using connectors or splices. Alternatively or in addition, optical security elements can terminate in an optical waveguide or light pipe extending to a surface and/or edge of the composite panel. In such an arrangement, an abutting or overlapping joint at which such features overlap on different panels can be used to provide coupling of optical energy between the panels.
One or more connectors 1812 can be provided to couple the embedded security feature of the composite edge member to one or more of the adjacent composite panels. As shown, data connectors 1812 are electrically conducting fasteners, such as screws. More generally, the connectors can include one or more fasteners, such as pins, nails, and staples, or connectors. Alternatively or in addition, coupling between embedded security features of one or more adjacent composite panels and/or edge members uses a wireless link. The wireless link can include inductive coupling arrangement using transformers, and radio frequency arrangement through coupled antennas. In some embodiments, wireless coupling can be accomplished using electrical circuit components at least partially buried within the composite panel and composite edge member. Such embedded components can include transformers, antennas, and optical transmitters/receivers.
Enclosure 2100 may include monitor 2112 which is in communication with the security elements to monitor for any substantial breach of enclosure 2100. In some embodiments, monitor 2112 may include various energizers or detectors which work in concert with the security elements. Monitor 2112 may also be coupled to transmitter 2114, which may communicate (e.g. via a radio broadcast, modulated directed energy beam, wireless connection, RFID, etc.) with receiver 2116. Accordingly, receiver 2116 can be alerted to the detection of any substantial breach of enclosure 2100.
Referring to
Any of the functions described above in connection breach detection monitoring, communication, automated construction, data analysis, etc. can be implemented in hardware or software, or a combination of both. The methods can be implemented in computer programs using standard programming techniques following the method and figures described herein. Program code is applied to input data to perform the functions described herein and generate output information. The output information is applied to one or more output devices such as a display monitor, memory, etc. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the programs can be implemented in assembly or machine language, if desired. In any case, the language can be a compiled or interpreted language. Moreover, the program can run on dedicated integrated circuits preprogrammed for that purpose.
Each such computer program is preferably stored on a storage medium or device (e.g., ROM or magnetic diskette) readable by a general or special purpose programmable computer, for configuring and operating the computer when the storage media or device is read by the computer to perform the procedures described herein. The computer program can also reside in cache or main memory during program execution. The analysis method can also be implemented as a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner to perform the functions described herein.
A number of examples above describe surfaces or enclosures of substantially contiguous composite material. As will be understood by those skilled in the art, depending on the application, some small gaps in such surfaces may be permissible. For example, in some embodiments, a substantially contiguous composite surface or enclosure may have gaps or apertures having a characteristic size of 0.01 mm or less, 0.0.1 mm or less, 1 mm or less, 10 mm or less, or 100 mm or less. In various embodiments, the acceptable gap size will depend on considerations such as the sensitivity of the cargo being protected, the size of the container, cost issues, etc.
A number of documents have been incorporated by reference herein. In the event that any material, e.g. a technical definition, found in the incorporated documents conflicts with that found in the instant text, the material in instant text holds.
While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.
For example, although the above examples describe the use of composite materials, it will be understood that the techniques described herein may be applied to security structures featuring other types of materials not suitable for welding (e.g. plastics, wood, non-reinforced resins, ceramics, epoxies, etc.). Such materials may include embedded security elements, as described above.
Claims
1. An apparatus comprising:
- one or more security structures each comprising: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels, wherein the security element is configured to detect a breach in the composite panel.
2. The apparatus of claim 1, wherein a first and a second of the security element embedded, respectively, within a first and a second of the plurality of composite panels are interconnected such that the first security element can detect a breach in the second composite panel.
3. The apparatus of claim 2, wherein the one or more security structures comprise a first and a second security structure, each comprising:
- a weldable frame;
- at least one composite panel, said panel securable to the weldable frame, and
- a respective security element embedded within the composite panel configured to detect a breach in the composite panel;
- said apparatus further comprising a corner joint, wherein, at said corner joint,
- at least a portion of the weldable frame of each of the first and the second security structures are welded to each other or to a weldable support member, and
- at least a portion of a composite panel from the first security structure and at least a portion of a composite panel from the second security structure form an angled joint or substantially contiguous composite material.
4. The apparatus of claim 3, wherein the corner joint comprises an interconnect between security elements embedded in the first and the second security structures.
5. The apparatus of claim 2, wherein the plurality of security structures form an enclosure surrounding a volume with substantially contiguous composite material.
6. The apparatus of claim 5, wherein the enclosure is substantially free of gaps in the contiguous composite material, and comprises a plurality of interconnected security elements configured to detect any substantial breach of the enclosure.
7. The apparatus of claim 6, further comprising a monitor in communication with the plurality of interconnected security elements and configured to monitor for any substantial breach of the enclosure.
8. The apparatus of claim 7, wherein the monitor unit is located within the enclosure, and further comprising a transmitter configured to transmit a signal indicative of a detection of a substantial breach of the enclosure to a receiver located outside of the enclosure.
9. The apparatus of claim 6, further comprising a weldable container frame and wherein at least one weldable frame of the one or more security structures is welded to the container frame.
10. The apparatus of claim 9, further comprising a metal shipping container, said shipping container surrounding the enclosure and comprising at least a portion of the weldable container frame.
11. The apparatus of claim 10, wherein the enclosure substantially conforms to the interior shape of the metal shipping container.
12. The apparatus of claim 1, wherein the at least one joint comprises at least one chosen from the list consisting of: a butt joint, a lap joint, a mitered joint, a dado.
13. The security structure of claim 1, wherein the security element comprises a conductive element or a waveguide.
14. The apparatus of claim 1, wherein each composite panel of the plurality of composite panels is fastened to the frame using at least one chosen from the group consisting of: a chemical fastener, glue, epoxy, cement.
15. The apparatus of claim 5, further comprising a composite member including a security element, the elongated composite member configured to cover a gap between adjacent composite panels forming the enclosure.
16. A method comprising
- assembling one or more security structures by, for each security structure, forming a weldable frame; aligning each panel of a plurality of composite panels to form a substantially contiguous composite surface with the other panels, each of the composite panels including an embedded security element configured to detect a breach of the composite panel; and
- attaching each panel of the plurality of aligned composite panels to the weldable frame thereby forming a contiguous composite surface attached to the welded metal frame.
17. The method of claim 16, further comprising interconnecting a plurality of the embedded security elements.
18. The method of claim 17, wherein one or more security structures comprise a plurality of security structures, and further comprising:
- arranging the security structures to form an enclosure surrounding a volume with substantially contiguous composite material, wherein the enclosure: is substantially free of gaps in the contiguous composite material, and comprises a plurality of interconnected security elements configured to detect any substantial breach of the enclosure.
19. The method of claim 18, further comprising monitoring for a detected breach of the enclosure.
20. The method of claim 18, further comprising, prior to attaching each panel of the plurality of aligned composite panels to the weldable frame of each security structure, welding the weldable frame of one or more of the security elements to:
- the weldable frame of another of the one or more of the security elements or
- a weldable container frame.
Type: Application
Filed: Jan 22, 2009
Publication Date: Jan 28, 2010
Patent Grant number: 8344885
Applicant:
Inventor: Fred Hewitt SMITH (Orono, ME)
Application Number: 12/358,132
International Classification: B65D 6/28 (20060101); B23P 11/00 (20060101); B65D 88/00 (20060101);